RSA - Attendees drop ball on Wi-Fi security
- — 12 February, 2007 09:28
More than half of the wireless LAN devices being used at this week's RSA Conference on information security are themselves unsecured.
That means that the network security experts charged with protecting enterprise data aren't even protecting their own.
The rather startling finding is the result of two days of WLAN traffic scanning by wireless security vendor AirDefense . On the first two days of the conference, AirDefense monitors found that more than half of the wireless devices on the conference network were vulnerable to two classes of attacks.
One is the "Evil Twin" attack, in which the attacker tricks a victim into wirelessly connecting to a laptop or PDA posing as a legitimate access point or hotspot. The second class was various "Zero Day" attacks, which exploit newly found software flaws, in applications like Internet Explorer, that haven't yet been fixed by the vendor, or patched by the user.
On Day One, Tuesday, 347 of 623, or 56 percent, laptops and PDAs were vulnerable. On the second day, almost the same percentage, 57 percent, were vulnerable, but the numbers were higher: 481 of 847 devices.
In a statement, AirDefense CSO Richard Rushing said the vulnerabilities were not the fault of the conference network, which he praised as being secured "as well or better than most standard corporate networks."
On Day One of the monitoring, AirDefense found 70 devices using peer-to-peer connections by means of common SSIDs, or network names, such as "Free Internet Access" and "Linksys." On Day Two, the number rose to 87.
The monitoring found 30 devices pretending to be access points, and two of these pretending to be access points on the conference network. One of the two even had a self-sign certificate to mimic the conference authentication server. Five others were masquerading as common hotspots, with names such as "tmobile," "IBAHN" and several local hotels.
On Day One, there were 57 denial-of-service attacks, including de-authenticating clients and jamming transmissions. That jumped to 85 on Day Two.
The airwaves were being regularly and repeatedly scanned for access points by attendees using programs such as NetStumbler. Forty-five devices on the network had altered media access controlÂ addresses, apparently in an effort to hide the identity of the device and its user.
On Day Two, AirDefense reported, the tools used in the attacks were more sophisticated. Some tools were variations of the Karma program, which mimics the access point that the target laptop or PDA is probing for. One attacker had wirelessly seized eight machines and used them to launch simultaneous attacks.
Many client devices connecting to an unencrypted network disclosed a wealth of information about their corporate network, including domain, authentication server, Active Directory, user name and computer name. Leaking NetBIOS and IPX traffic information was common. According to AirDefense, attackers could (and may have) captured the corporate username and authentication hash sent by the users over the airwaves.